Real-self accounts of moral responsibility distinguish between various types of motivational elements. They claim that an agent is responsible for acts suitably related to elements that constitute the agent's real self. While such accounts have certain advantages from a compatibilist perspective, they are problematic in various ways. First, in it, authority and authenticity conceptions of the real self are often inadequately distinguished. Both of these conceptions inform discourse on identification, but only the former is relevant to moral responsibility. Second, (...) authority and authenticity real-self theories are unable to accommodate cases in which the agent neither identifies nor disidentifies with his action and yet seems morally responsible for what he does. Third, authority and authenticity real-self theories are vulnerable to counterexamples in which the provenance of the agent's real self undermines responsibility. (shrink)

The following analysis shows how developments in epistemic logic can play a nontrivial role in cognitive neuroscience. We argue that the striking correspondence between two modes of identification, as distinguished in the epistemic context, and two cognitive systems distinguished by neuroscientific investigation of the visual system (the "where" and "what" systems) is not coincidental, and that it can play a clarificatory role at the most fundamental levels of neuroscientific theory.

The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are directly related to one's (...) sense of autonomy and self-esteem. Releasing biometric ID's into the public sphere therefore involves a tangible loss of control and privacy. This does not mean that to do so is never a reasonable act, but rather that it should be carefully weighed, and should never be mandatory in order to receive any fundamental rights or benefits. (shrink)

This paper offers a novel ‘changing places’ account of identification in games, where the consequences of role swapping are crucial. First, it illustrates how such an account is consistent with the view, in classical game theory, that only outcomes (and not pathways) are significant. Second, it argues that this account is superior to the ‘pooled resources’ alternative when it comes to dealing with some situations in which many players identify. Third, it shows how such a ‘changing places’ account can (...) be used in games where some of the players identify with one another, but others do not. Finally, it illustrates how the model can handle the notion that identification comes in degrees. (shrink)

Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer (...) an overview and discussion of the most important ethical issues concerning RFID, and describes and examine some methods of protecting privacy. (shrink)

In this article, we propose an adaption to stakeholder theory whereby stakeholders are conceptualized on the basis of their social identity. We begin by offering a critical review of both traditional and more recent developments in stakeholder theory, focusing in particular on the way in which stakeholder categories are identified. By identifying critical weaknesses in the existing approach, as well as important points of strength, we outline an alternative approach that refines our understanding of stakeholders in important ways. To do (...) so, we draw on notions of social identity as the fundamental basis for group cohesion, mobilization, and action. A new form of cross-mapping as a basis for stakeholder identification is advanced and key research questions are set out. (shrink)

This study proposes two identification cuing factors (i. e., CSR associations and CSR participation) to understand how corporate social responsibility (CSR) relates to employees' identification with their firm.The results reveal that a firm's CSR initiatives increase employee-company identification (E-C identification).E-C identification, in turn, influences employees' commitment to their company. However, CSR associations do not directly influence employees' identification with a firm, but rather influence their identification through perceived external prestige (PEP). Compared to CSR (...) associations, CSR participation has a direct influence on E-C identification. On the basis of these findings, it is argued that CSR performance can be an effective way for companies to maintain a positive relationship with their employees. (shrink)

Governing by identity describes the emerging regime of a globalizing, mobile world. Governance depends on identification but identification increasingly depends on biometrics. This 'solution' to difficulties of verification is described and some technical weaknesses are discussed. The role of biometrics in classification systems is also considered and is shown to contain possible prejudice in relation to racialized criteria of identity. Lastly, the culture of biometric identification is shown to be limited to abstract data, artificially separated from the (...) lived experience of the body including the orientation to others. It is proposed that creators of national ID systems in particular address these crucial deficiencies in their attempt to provide new modes of verification. (shrink)

This research analyses the influence of the perception of Corporate Social Responsibility (CSR image) on consumer–company identification (C–C identification). This analysis involves an examination of the influence of CSR image on brand identity characteristics which provide consumers with an instrument to satisfy their self-definitional needs, thereby perceiving the brand as more attractive. Also, the direct and mediated influences (through their effect on brand attitude), of CSR-based C–C identification on purchase intention are analysed. The results offer empirical evidence (...) that CSR generates more C–C identification because it improves brand prestige and distinctiveness; brand coherence is also a powerful antecedent of brand attractiveness in the context of CSR communication. Finally, CSR-based C–C identification is able to generate directly better attitude towards the brand and greater purchase intention. (shrink)

This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and (...) post-sales uses. A proposal to address these privacy concerns is detailed, generally based on past philosophical frameworks and specifically on the Fair Information Practices that the Federal Trade Commission has outlined for the electronic marketplace (e-commerce). It is proposed that by application of these Fair Information Practices, the major privacy issues of RFID can be addressed. (shrink)

This paper looks at the history of identification in England over the past 1,000 years. It contends that techniques and technologies of identification do not identify a single entity but a number of forms of personality, including the juridical person, the citizen and the deviant. Individuals can be the bearers of more than one of these personalities at the same time, or over the course of their life. These personalities are created by social performances to which people are (...) trained to react conventionally. As such identity, and its identification, is a social and cultural phenomenon, rather than a ‘thing’. Each of the personalities noted above has been identified historically in differing ways -through possessions or techniques in the case of the juridical person, though the community in the case of the citizen, and on, or through, the body in the case of the deviant. In the contemporary world these distinctions are being effaced, as all forms of identification are being reduced to the body and the database. This levelling of social forms of being has implication for what it means to be a person in our society, and for public perceptions of new techniques and technologies of identification. (shrink)

Radio Frequency Identification (RFID) is quickly growing in its applications. A variety of uses for the technology are beginning to be developed, including chips which can be used in identification cards, in individual items, and for human applications, allowing a chip to be embedded under the skin. Such chips could provide numerous benefits ranging from day-to-day convenience to the increased ability of the federal government to adequately ensure the safety of its citizens. However, there are also valid concerns (...) about the potential of this technology to infringe on privacy, creating fears of a surveillance society. These are concerns that must be addressed quickly, with sensitivity to individual interests and societal welfare, allowing humanity to reap the benefits of convenience and safety without paying an unacceptable price in the loss of privacy. (shrink)

When the stored representation of the meaning of a stimulus is accessed through the processing of a sensory input it is maintained in an activated state for a certain amount of time that allows for further processing. This semantic activation is generally accompanied by conscious identification, which can be demonstrated by the ability of a person to perform discriminations on the basis of the meaning of the stimulus. The idea that a sensory input can give rise to semantic activation (...) without concomitant conscious identification was the central thesis of the controversial research in subliminal perception. Recently, new claims for the existence of such phenomena have arisen from studies in dichotic listening, parafoveal vision, and visual pattern masking. Because of the fundamental role played by these types of experiments in cognitive psychology, the new assertions have raised widespread interest. (shrink)

In this article, we hypothesize that leaders who display group-oriented values (i.e., values that focus on the welfare of the group rather than on the self-interest of the leader) will be evaluated more positively by their followers than leaders who do not display group-oriented values. Importantly, we expected these effects to be more pronounced for leaders who are ingroup members (i.e., stemming from the same social group as their followers) than for leaders who are outgroup members (i.e., leaders stemming from (...) a different social group than their followers). We tested our hypotheses in two studies. Results of a field study ( N = 95) showed the expected relationship between leaders’ group-oriented values and followers’ identification with their leaders. A scenario study ( N = 137) replicated the results and extended it to followers’ endorsement of their leaders. Overall, these findings suggest that displaying group-oriented values pays off more for ingroup than for outgroup leaders. (shrink)

It is proved that for any k, the class of classical categorial grammars that assign at most k types to each symbol in the alphabet is learnable, in the Gold (1967) sense of identification in the limit from positive data. The proof crucially relies on the fact that the concept known as finite elasticity in the inductive inference literature is preserved under the inverse image of a finite-valued relation. The learning algorithm presented here incorporates Buszkowski and Penn's (1990) algorithm (...) for determining categorial grammars from input consisting of functor-argument structures. (shrink)

To explain agent-identification behaviours, universalist theories in the biological and cognitive sciences have posited mental mechanisms thought to be universal to all humans, such as agent detection and face recognition mechanisms. These universalist theories have paid little attention to how particular sociocultural or historical contexts interact with the psychobiological processes of agent-identification. In contrast to universalist theories, contextualist theories appeal to particular historical and sociocultural contexts for explaining agent-identification. Contextualist theories tend to adopt idiographic methods aimed at (...) recording the heterogeneity of human behaviours across history, space, and cultures. Defenders of the universalist approach tend to criticise idiographic methods because such methods can lead to relativism or may lack generality. To overcome explanatory limitations of proposals that adopt either universalist or contextualist approaches in isolation, I propose a philosophical model that integrates contributions from both traditions: the psycho-historical theory of agent-identification. This theory investigates how the tracking processes that humans use for identifying agents interact with the unique socio-historical contexts that support agent-identification practices. In integrating hypotheses about the history of agents with psychological and epistemological principles regarding agent-identification, the theory can generate novel hypotheses regarding the distinction between recognition-based, heuristic-based, and explanation-based agent-identification. (shrink)

Building upon social and racial identity theories, this study examines the role of positive relational climate in predicting interpersonal helping behaviors (IHBs) at the workplace. Within this context, we examine both the role of mutual respect and psychological safety as exemplars of positive relational climate, and the mediating role of organizational identification (OI). The study also recognizes the importance of individual differences by examining racial differences in OI and IHBs. Results support the hypotheses and strengthen claims of social and (...) racial identity theories. (shrink)

Abusive supervision has been shown to have significant negative consequences for employees’ well-being, attitudes, and behavior. However, despite the devastating impact, it might well be that employees do not always react negatively toward a leader’s abusive behavior. In the present study, we show that employees’ organizational identification and abusive supervision interact for employees’ perceived cohesion with their work group and their tendency to gossip about their leader. Employees confronted with a highly abusive supervisor had a stronger perceived cohesion and (...) engaged in less gossiping behavior when they identified more strongly with their organization. Our findings illustrate that organizational identification functions as a buffer for those confronted with an abusive supervisor. (shrink)

A real but typical case of identity fraud is used to open up the complex web of identification systems in Brazil. It is argued that identification has two poles related to the nature of citizenship—repression and inclusion—and that reactions from citizens to new identification schemes can be attributed to how they view the purpose of the cards in these terms. In Brazil, a sense of inclusion and citizenship based on a fear of anonymity and exclusion predominates leading (...) to widespread support amongst even critics of state activities. However, this may be undermined by the lack of state preparation for an information society, particularly the absence of meaningful data protection laws. (shrink)

This article examines the mediation effect of brand identification and the moderating effect of service quality (SQ) on the effects of corporate social responsibility (CSR) association on service brand performance. A survey of customers of mobile telecommunications services was conducted. The study finds, first, that both CSR and SQ have direct effects on brand identification and customer satisfaction and indirect effects on customer satisfaction (via brand identification) and on service brand loyalty (via customer satisfaction and via "brand (...)identification/customer satisfaction"). Second, SQ enhances the effect of CSR on brand identification. This study contributes to the literature by incorporating three perspectives of service brand performance — CSR association, SQ, and brand identification - into one general framework that stresses (a) the mediating role of brand identification in predicting customer satisfaction and service brand loyalty; and (b) the interactive effect of CSR and SQ in predicting brand identification. (shrink)

In this article, we hypothesize that leaders who display group-oriented values (i.e., values that focus on the welfare of the group rather than on the self-interest of the leader) will be evaluated more positively by their followers than leaders who do not display group-oriented values. Importantly, we expected these effects to be more pronounced for leaders who are ingroup members (i.e., stemming from the same social group as their followers) than for leaders who are outgroup members (i.e., leaders stemming from (...) a different social group than their followers). We tested our hypotheses in two studies. Results of a field study (N = 95) showed the expected relationship between leaders’ group-oriented values and followers’ identification with their leaders. A scenario study (N = 137) replicated the results and extended it to followers’ endorsement of their leaders. Overall, these findings suggest that displaying group-oriented values pays off more for ingroup than for outgroup leaders. (shrink)

The present study tested the hypothesis that the effects of mental imagery on subsequent perception occur at a later matching stage in perceptual identification, but not in the early perceptual stage as in perceptual detection. The behavioral results suggested that the effect of visual imagery on visual identification is content-specific, i.e., imagining a congruent face facilitates face identification, whereas a mismatch between imagery and perception leads to an interference effect. More importantly, the ERP results revealed that a (...) more negative N2 response to the subsequent visual face stimuli was elicited over fronto-central sites in the mismatch and no-imagery conditions as compared to that in the match condition, with the early P1 and N170 components independent of manipulations. The latency and distribution of the neural effects demonstrate that the matching step, but not the earlier perceptual process, is affected by the preceding visual imagery in the context of face identification. We discuss these results in a broader context that the imagery-perception interaction may depend on task demand. (shrink)

Little is known about employees' responses to their organizations' initiatives in corporate social responsibility (CSR). Academics have already identified a few outcomes regarding CSR's impact on employees' attitudes and behaviours; however, studies explaining the underlying mechanisms that drive employees' favourable responses to CSR remain largely unexplored. Based on organizational identification (OI) theory, this study surveyed 155 employees of a petrochemical organization to better elucidate why, how and under which circumstances employees might positively respond to organizations' CSR initiatives in the (...) controversial oil industry sector. Findings first support that perceived CSR (i.e. environmental CSR) positively relates to employees' OI which is known as an important antecedent of employees' outcomes (Riketta, J Vocat Behavior, 66(2):358, 2005). Furthermore, results highlighted that the relationship between perceived CSR and employees' OI is mediated by organizational trust. Finally, this study also revealed that some contingency factors such as employees' attributions of self-centred motives to their organization's investment in environmental issues can moderate the relationship between perceived CSR and organizational trust. Based on these findings, it is argued that CSR initiatives can support organizations' efforts to maintain a strong relationship with their employees, and gain their support even in a controversial industry sector. (shrink)

Ideals (or ideal values) help people to navigate in social life. They indicate at a very fundamental level what people are concerned about, what they strive for, and what they want to be affiliated with. Transferring this to a leader–follower analysis, our first study (n = 306) confirms that followers’ identification and satisfaction with their leaders are stronger, the more leaders match followers’ ideal leader values. Study 2 (n = 244) extends the perspective by introducing the novel concept of (...) counter-ideals (i.e., how an ideal leader should not be) as a second, non-redundant point of reference. Results confirm that a leader’s match on ideal and on counter-ideal values have independent effects in that both explain unique variance in followers’ identification and satisfaction with their leader. Study 3 (n = 136) replicates the previous results in an experimental scenario study and provides evidence for the proposed causal direction of the underlying process. We conclude that counter-ideal values might be an additional point of reference that people use to triangulate targets above and beyond ideal values and discuss the implications of our findings for value research and management. (shrink)

The last 40 years have witnessed a growing interest in the mechanisms underlying the visual identification of complex words. A large amount of experimental data has been amassed, but although a growing number of studies are proposing explicit theoretical models for their data, no comprehensive theory has gained substantial agreement among scholars in the field. We believe that this is due, at least in part, to the presence of several controversial pieces of evidence in the literature and, consequently, to (...) the lack of a well-defined set of experimental facts that any theory should be able to explain. With this review, we aim to delineate the state of the art in the research on the visual identification of complex words. By reviewing major empirical evidences in a number of different paradigms such as lexical decision, word naming, and masked and unmasked priming, we were able to identify a series of effects that we judge as reliable or that were consistently replicated in different experiments, along with some more controversial data, which we have tried to resolve and explain. We concentrated on behavioral and electrophysiological studies on inflected, derived and compound words, so as to span over all types of complex words. The outcome of this work is an analytical summary of well-established facts on the most relevant morphological issues, such as regularity, morpheme position coding, family size, semantic transparency, morpheme frequency, suffix allomorphy and productivity, morphological entropy, and morpho-orthographic parsing. In discussing this set of benchmark effects, we have drawn some methodological considerations on why contrasting evidence might have emerged, and have tried to delineate a target list for the construction of a new all-inclusive model of the visual identification of morphologically complex words. (shrink)

The article analyses legal preconditions for personal identification in physical and electronic space (hereinafter – cyberspace). Analysis of legal governing of identification in physical space is followed by the analysis of the same in cyberspace. Compulsory elements of identification in physical space and compulsory and non-compulsory elements of identification in cyberspace are provided which leads to conclusions about problem aspects concerning personal identification in cyberspace and related legal governing. This scientific article consists of four main (...) chapters. The first chapter „Identity and Personal Identification“ looks into identity, its content and elements alongside with personal identification. The second chapter „Personal Identification in Physical Space“ scrutinizes legal preconditions of identification in physical space in Lithuania. The third chapter „Personal Identification in Cyberspace“ looks into elements of legally regulated and non-regulated personal identification in cyberspace and discusses identity of a person in cyberspace. The fourth chapter „Electronic Identity of a Person and Legal Regulation“ analyzes and systematizes elements of electronic identity of the person and presumes their reliability and mandatory legal governing. (shrink)

Are task-irrelevant stimuli processed to a level enabling individual identification? This question is central both for perceptual processing models and for applied settings (e.g., eyewitness testimony). Lavie’s load theory proposes that working memory actively maintains attentional prioritization of relevant over irrelevant information. Loading working memory thus impairs attentional prioritization, leading to increased processing of task-irrelevant stimuli. Previous research has shown that increased working memory load leads to greater interference effects from response competing distractors. Here we test the novel prediction (...) that increased processing of irrelevant stimuli under high working memory load should lead to a greater likelihood of incidental identification of entirely irrelevant stimuli. To test this, we asked participants to perform a word-categorization task while ignoring task-irrelevant images. The categorization task was performed during the retention interval of a working memory task with either low or high load (defined by memory set size). Following the final experimental trial, a surprise question assessed incidental identification of the irrelevant image. Loading working memory was found to improve identification of task-irrelevant faces, but not of building stimuli (shown in a separate experiment to be less distracting). These findings suggest that working memory plays a critical role in determining whether distracting stimuli will be subsequently identified. (shrink)

Are task-irrelevant stimuli processed to a level enabling individual identification? This question is central both for perceptual processing models and for applied settings (e.g., eyewitness testimony). Lavie’s load theory proposes that working memory actively maintains attentional prioritization of relevant over irrelevant information. Loading working memory thus impairs attentional prioritization, leading to increased processing of task-irrelevant stimuli. Previous research has shown that increased working memory load leads to greater interference effects from response competing distractors. Here we test the novel prediction (...) that increased processing of irrelevant stimuli under high working memory load should lead to a greater likelihood of incidental identification of entirely irrelevant stimuli. To test this, we asked participants to perform a word-categorization task while ignoring task-irrelevant images. The categorization task was performed during the retention interval of a working memory task with either low or high load (defined by memory set size). Following the final experimental trial, a surprise question assessed incidental identification of the irrelevant image. Loading working memory was found to improve identification of task-irrelevant faces, but not of building stimuli (shown in a separate experiment to be less distracting). These findings suggest that working memory plays a critical role in determining whether distracting stimuli will be subsequently identified. (shrink)

Little is known about employees’ responses to their organizations’ initiatives in corporate social responsibility (CSR). Academics have already identified a few outcomes regarding CSR’s impact on employees’ attitudes and behaviours; however, studies explaining the underlying mechanisms that drive employees’ favourable responses to CSR remain largely unexplored. Based on organizational identification (OI) theory, this study surveyed 155 employees of a petrochemical organization to better elucidate why, how and under which circumstances employees might positively respond to organizations’ CSR initiatives in the (...) controversial oil industry sector. Findings first support that perceived CSR (i.e. environmental CSR) positively relates to employees’ OI which is known as an important antecedent of employees’ outcomes (Riketta, J Vocat Behavior, 66(2):358, 2005). Furthermore, results highlighted that the relationship between perceived CSR and employees’ OI is mediated by organizational trust. Finally, this study also revealed that some contingency factors such as employees’ attributions of self-centred motives to their organization’s investment in environmental issues can moderate the relationship between perceived CSR and organizational trust. Based on these findings, it is argued that CSR initiatives can support organizations’ efforts to maintain a strong relationship with their employees, and gain their support even in a controversial industry sector. (shrink)

Traditionally, conceptualizations of human values are based on the assumption that individuals possess a single integrated value system comprising those values that people are attracted by and strive for. Recently, however, van Quaquebeke et al. (in J Bus Ethics 93:293–305, 2010 ) proposed that a value system might consist of two largely independent value orientations—an orientation of ideal values and an orientation of counter-ideal values (values that individuals are repelled by), and that both orientations exhibit antithetic effects on people’s responses (...) to the social world. Following a call for further research on this distinction, we conducted two studies to assess the independent effects of ideal and counter-ideal values in leadership settings. Study 1 ( N = 131) finds both value orientations to explain unique variance in followers’ vertical respect for their leaders. Study 2 ( N = 136) confirms these results and additionally shows an analogous effect for followers’ identification with their leaders. Most importantly, we find that both value orientations exhibit their effects only independently when the content of the two orientations pertain to different value types in Schwartz’s (in J Soc Issues 50:19–46, 1994 ) circumplex model. Implications for theory and practice are discussed. (shrink)

The term "stakeholder engagement" has gained increasing prominence over the last few years. This prominence is fueled by a range of issues such as an increased dissatisfaction with business's focus on stockholder/shareholder interests and the demands for greater transparency from business following major business scandals. A perceived response to this issue in South Africa has been the inclusion of guidelines on stakeholder engagement in the King II Report on Corporate Governance. Despite this growing interest, there has not been clarity on (...) how companies engage with their stakeholders and specifically with how they identify and prioritize their stakeholders. The study sought to establish the reporting practices of South African business in relation to stakeholder identification and prioritization through a content analysis of their annual reports. The findings are discussed and recommendations on the two aspects of stakeholder engagement presented. (shrink)

We measured thresholds in a 1-of-10 face identification task in which stimuli were embedded in orientation-filtered Gaussian noise. For upright faces, the threshold elevation produced by the masking noise varied as a function of noise orientation: significantly greater masking was obtained with horizontal noise than with vertical noise. However, the orientation selectivity of masking was significantly less with inverted faces. The performance of an ideal observer was qualitatively similar to human observers viewing upright faces – the masking function exhibited (...) a peak for horizontally -oriented noise – although the selectivity of masking was greater than what was observed in human observers. These results imply that significantly more information about facial identity was conveyed by horizontal contours than by vertical contours, and that human observers use this information more efficiently to identify upright faces than inverted faces. We also found a significant positive correlation between selectivity for horizontal information and face identification accuracy for upright, but not inverted faces. Finally, there was a significant positive correlation between horizontal tuning and the size of the face inversion effect. These results demonstrate that the use of information conveyed by horizontal contours is associated with face identification accuracy and the magnitude of the face inversion effect. (shrink)

Does the human mind allow for self-locating at more than one place at a time? Evidence from neurology, cognitive neuroscience, and experimental psychology suggests that mental bilocation is a complex, but genuine experience, occurring more frequently than commonly thought. In this article, we distinguish between different components of bilocated self-representation: self-localization in two different places at the same time, self-identification with another body, reduplication of first-person perspective. We argue that different forms of mental bilocation may result from the combination (...) of these components. To illustrate this, we discuss evidence of mental bilocation in pathological conditions such as heautoscopy, during immersion in virtual environments, and in everyday life, during social interaction. Finally, we consider the conditions for mental bilocation and speculate on the possible role of mental bilocation in the context of social interaction, suggesting that self-localization at two places at the same time may prove advantageous for the construction of a shared space. (shrink)

The present study tested the hypothesis that the effects of mental imagery on subsequent perception occur at a later matching stage in perceptual identification, but not in the early perceptual stage as in perceptual detection. The behavioral results suggested that the effect of visual imagery on visual identification is content-specific, i.e., imagining a congruent face facilitates face identification, whereas a mismatch between imagery and perception leads to an interference effect. More importantly, the ERP results revealed that a (...) more negative N2 response to the subsequent visual face stimuli was elicited over fronto-central sites in the mismatch and no-imagery conditions as compared to that in the match condition, with the early P1 and N170 components independent of manipulations. The latency and distribution of the neural effects demonstrate that the matching step, but not the earlier perceptual process, is affected by the preceding visual imagery in the context of face identification. We discuss these results in a broader context that the imagery-perception interaction may depend on task demand. (shrink)

To introduce the issue of the tracking and identification of human agents, I examine the ability of an agent to track a human person and distinguish this target from other individuals: The ability to perform person identification. First, I discuss influential mechanistic models of the perceptual recognition of human faces and people . Such models propose detailed hypotheses about the parts and activities of the mental mechanisms that control the perceptual recognition of persons. However, models based on perceptual (...) recognition are incomplete theories of person identification because they do not explain several identification behaviors that are fundamental to human social interactions . Furthermore, recognition-based models tend to appeal to the controversial concept of the “identity” of a person without explaining what determines personal identity and persistence. To overcome these limitations, I propose to integrate the face-recognition program into a broader causal-historical theory of identification. The causal-historical theory of identification complements models focused on perceptual recognition because it can account for the types of non-perceptual identification overlooked by the face-recognition program. Moreover, it can decompose the identification behaviors into tracking processes that succeed or fail to be sensitive to causal characteristics of a target. I illustrate these advantages with a discussion of the difference between the tracking of a person understood as either a causally continuous biological organism or a psychologically continuous mind . Finally, I argue that the causal-historical theory provides a theoretical framework for investigating the tracking of relations between a target and its contextual and historical attributes, such as a target's possessions. (shrink)

This study investigated the degree to which audiovisual presentation (compared to auditory-only presentation) affected isolation point (IPs, the amount of time required for the correct identification of speech stimuli using a gating paradigm) in silence and noise conditions. The study expanded on the findings of Moradi et al. (under revision), using the same stimuli, but presented in an audiovisual instead of an auditory-only manner. The results showed that noise impeded the identification of consonants and words (i.e., delayed IPs (...) and lowered accuracy), but not the identification of final words in sentences. In comparison with the previous study by Moradi et al., it can be concluded that the provision of visual cues expedited IPs and increased the accuracy of speech stimuli identification in both silence and noise. The implication of the results is discussed in terms of models for speech understanding. (shrink)

This paper is concerned with the problem of selfidentification in the domain of action. We claim that this problem can arise not just for the self as object, but also for the self as subject in the ascription of agency. We discuss and evaluate some proposals concerning the mechanisms involved in selfidentification and in agencyascription, and their possible impairments in pathological cases. We argue in favor of a simulation hypothesis that claims that actions, whether overt or covert, are centrally simulated (...) by the neural network, and that this simulation provides the basis for action recognition and attribution. (shrink)

This essay deals with the impact of Hegel's philosophy of religion by examining his positions on religious identity and on the relationship between theology and history. I argue that his criterion for religious identity was socio-historical, and that his philosophical theology was historical rather than normative. These positions help explain some historical peculiarities regarding the effect of his philosophy of religion. Of particular concern is that although Hegel’s own aims were apologetic, his major influence on religious thought was in the (...) development of various historical and critical approaches to religion. (shrink)

The <span class='Hi'>test</span> Turing proposed for machine intelligence is usually understood to be a <span class='Hi'>test</span> of whether a computer can fool a human into thinking that the computer is a human. This standard interpretation is rejected in favor of a <span class='Hi'>test</span> based on the Imitation Game introduced by Turing at the beginning of "Computing Machinery and Intelligence.".

Definitions of what it is to be a stakeholder are divided into "claimant" definitions requiring some sort of claim on the services of a business, "influencer" definitions requiring only a capacity to influence the workings of the business, and "combinatory" definitions allowing for either or both of these requirements. It is argued that for the purposes of business ethics, stakeholding has to be about improving the moral conduct of businesses by directing them at serving more than just the interests of (...) owners. On that basis, influencer definitions are eliminated on the grounds that they only concern morally neutral strategic considerations and combinatory definitions on the grounds that the combining of ethical and strategic considerations they promise can be less confusingly achieved through an exclusively claimant definition. It is concluded that for the purposes of business ethics, stakeholders are claimants towards whom businesses owe perfect or imperfect moral duties beyond those generally owed to people at large. (shrink)

To further the debate on the ethical dimension of transformational leadership from a virtue ethics perspective, this study focused on leaders’ in-group orientation as well as their in-group versus out-group orientation in situations of conflict between organizational interests and broader ethical values. More precisely, the current study captured leaders’ organizational identification as well as their willingness to engage in unethical pro-organizational behavior and tested the relations between these attitudes and follower-perceived TFL behavior. In total, the leadership behaviors of 112 (...) middle- and top-level managers were evaluated by 900 direct-reports. Results showed leaders’ organizational identification to be positively related to TFL. However, we found no relation between leaders’ willingness to engage in unethical pro-organizational behavior and TFL. Implications regarding the ethical dimension of TFL are discussed. (shrink)

In this article, drawing from a relational perspective, we explore the relationship between moral leadership and employee creativity, treat employee identification with leader and leader–member exchange as two mediators, and develop a new theoretical model of employee creativity. Our data collected from 160 supervisor–subordinate dyads in the People’s Republic of China demonstrate that moral leadership is positively related to both employee identification with leader and LMX. Further, employee identification with leader partially mediates the relationship between moral leadership (...) and LMX. In particular, employee identification with leader greatly enhances LMX which leads to high creativity. Overall, the relationship between moral leadership and employee creativity is mediated by not only employee identification with leader but also LMX. Our findings offer a new theoretical framework for future theory development and testing on creativity as well as practical implications for researchers and managers in business ethics. (shrink)